A Novel Data Encryption and Distribution Approach for High Security and Availability Using LU Decomposition

As the society increasingly relies on digitally stored and accessed information, supporting the availability, persistence, integrity, and confidentiality of the information becomes more critical. Mirroring is a simple but practical approach allowing reasonable availability and accessibility, but it cannot provide security. This paper proposes an approach which integrates data encryption and distribution to allow high security while providing the same degree of availability as mirroring. It is based on LU decomposition of matrix. Analysis confirms that it allows slightly higher availability compared with mirroring scheme for both read and write operation. The proposed scheme needs almost the same storage space as mirroring.

[1]  Darrell D. E. Long,et al.  The management of replication in a distributed system , 1988 .

[2]  Jai Menon,et al.  orithms for Software ai d Low-cost ardware RAIDS , 1995 .

[3]  Michael Wiener,et al.  Advances in Cryptology — CRYPTO’ 99 , 1999 .

[4]  Yves Deswarte,et al.  Intrusion tolerance in distributed computing systems , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.

[5]  Hugo Krawczyk Distributed fingerprints and secure information dispersal , 1993, PODC '93.

[6]  Alfredo De Santis,et al.  Multiple ramp schemes , 1999, IEEE Trans. Inf. Theory.

[7]  David J. DeWitt,et al.  A performance study of three high availability data replication strategies , 2005, Distributed and Parallel Databases.

[8]  Ehud D. Karnin,et al.  On secret sharing systems , 1983, IEEE Trans. Inf. Theory.

[9]  J. Menon,et al.  Algorithms for software and low-cost hardware RAIDs , 1995, Digest of Papers. COMPCON'95. Technologies for the Information Superhighway.

[10]  Catherine A. Meadows,et al.  Security of Ramp Schemes , 1985, CRYPTO.

[11]  Randy H. Katz,et al.  A case for redundant arrays of inexpensive disks (RAID) , 1988, SIGMOD '88.

[12]  W. Greub Linear Algebra , 1981 .

[13]  Miguel Oom Temudo de Castro,et al.  Practical Byzantine fault tolerance , 1999, OSDI '99.

[14]  Hugo Krawczyk,et al.  Adaptive Security for Threshold Cryptosystems , 1999, CRYPTO.

[15]  Gregory R. Ganger,et al.  On Correlated Failures in Survivable Storage Systems , 2002 .

[16]  Darrell D. E. Long A technique for managing mirrored disks , 2001, Conference Proceedings of the 2001 IEEE International Performance, Computing, and Communications Conference (Cat. No.01CH37210).

[17]  David Joyner,et al.  Linear Algebra with Applications , 1998 .